A New Method to Detect Malicious DNS over HTTPS via Feature Reduction

Ali K. Bozkurt, Burcu Sönmez Sarikaya, Halil E. Aköz, Ataberk Taşpinar, Şerif Bahtiyar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The classification o f malicious D NS o ver HTTPS (DoH) as malicious or benign is a challenging task due to its encrypted nature and massive amount of data that needs to be analyzed. The lack of an accurate classification o f DoH violates the security requirements of DNS systems. Our aim in this paper is to detect malicious DoH by incorporating feature reduction to speed up the detection process with machine learning algorithms. We used three classification models with feature reductions. We achieved higher performance while keeping an acceptable accuracy reduction within a negligible margin. Experimental evaluations show that the proposed feature reduction provides a better performance for malicious DoH detection.

Original languageEnglish
Title of host publicationUBMK 2024 - Proceedings
Subtitle of host publication9th International Conference on Computer Science and Engineering
EditorsEsref Adali
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages754-759
Number of pages6
ISBN (Electronic)9798350365887
DOIs
Publication statusPublished - 2024
Event9th International Conference on Computer Science and Engineering, UBMK 2024 - Antalya, Turkey
Duration: 26 Oct 202428 Oct 2024

Publication series

NameUBMK 2024 - Proceedings: 9th International Conference on Computer Science and Engineering

Conference

Conference9th International Conference on Computer Science and Engineering, UBMK 2024
Country/TerritoryTurkey
CityAntalya
Period26/10/2428/10/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Keywords

  • DNS tunneling
  • DoH
  • Feature reduction
  • Machine learning
  • Malicious DoH

Fingerprint

Dive into the research topics of 'A New Method to Detect Malicious DNS over HTTPS via Feature Reduction'. Together they form a unique fingerprint.

Cite this